Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

350-501 Questions and Answers

Question # 6

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

A.

It support symmetric multiprocessing

B.

It allows all processes to use the same pool of memory.

C.

It runs on a 32-bit operating system.

D.

It is built on a GNX Neutrino Microkernel.

Full Access
Question # 7

Refer to the exhibit:

Which statement about the status of the neighbor relationship between R1 and R2 is true?

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Full Access
Question # 8

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

A.

show netconf-yang sessions detail

B.

show netconf-yang datastores

C.

show platform software yang-management process

D.

show netconf-yang sessions

Full Access
Question # 9

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Full Access
Question # 10

A network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Full Access
Question # 12

Refer to the exhibit:

Which information is provided for traceback analysis when this configuration is applied?

A.

BGP version

B.

packet size distribution

C.

source interface

D.

IP sub flow cache

Full Access
Question # 13

Refer to the exhibit. Router R1 is configured with class map CE with match Ip precedence critical to align with customer contract SLAs. The customer is sending all traffic from CE1 toward the FTP server with IP precedence 5 A network engineer must allow 10% of interface capacity on router R3 Which two actions must the engineer take to accomplish the task? (Choose two )

A.

lmptem4Dt4M$§ map on R1 to match all packets with QoS IP precedence value 100.

B.

Implement a class map on R3 to match all packets with QoS IP precedence value 101.

C.

Apply a policy map to R1 to reserve the remaining 10% of interface bandwidth.

D.

Apply a policy map to R3 to reserve 10% of interface bandwidth.

E.

Implement a class map on R3 to match all packets with QoS IP precedence.

Full Access
Question # 14

Which task must be performed first to Implement BFD in an IS-IS environment?

A.

Disable Cisco Express Forward.ng on all interfaces running routing protocols other than IS-IS

B.

Configure BFD under the IS-IS process

C.

Configure all ISIS routers as Level 2 devices

D.

Configure BFD in an interface configuration mode

Full Access
Question # 15

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Full Access
Question # 16

A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

Full Access
Question # 17

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Full Access
Question # 18

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.

The link state database provides segmentation by area, which improves the path-selection process

Full Access
Question # 19

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Full Access
Question # 21

What is a characteristic of the YANG model?

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Full Access
Question # 22

Refer for the exhibit. To optimize network operations, the senior architect created this Python 3.9 script for network automation tasks and to leverage Ansible 4.0 playbooks. Devices In the network support only RFC 2617-based authentication What does the script do?

A.

The script logs in via SSH and configures interface GigabitEthernetO/1 with IP address 10.1.131.112/30.

B.

The script leverages REST API calls and configures Interface GlgabilEthemet0/1 with IP address 10.1.131.112/30.

C.

The script performs a configuration sanity check on the device with IP address 172.168.211.65 via HTTP and returns an alert If the payload field falls to match.

D.

The script parses the JSON response from the router at IP address 172 168.211.65 and checks If the interface GigaWtEthernet0/1 with IP address 10.1.131.112 exists on the router.

Full Access
Question # 23

Simulation 8

Full Access
Question # 24

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

Which feature describes the adjacency SID?

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Full Access
Question # 26

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Full Access
Question # 27

Refer to the exhibit. ISP A provides MPLS L3VPN service to customer A with BGP as the external routing protocol. Customer A has just opened a new branch office in London and requested the service provider to implement lossless service between its two offices. The LDP is enabled over the MPLS backbone and label exchange is working normally. Which action must the ISP engineering team take to enable the service?

A.

Configure LDP and redistribute the route from EIGRP.

B.

Configure BGP address family VPNv4.

C.

Configure IGP and redistribute the route from BGP.

D.

Configure IGP LDP synchronization

Full Access
Question # 28

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Full Access
Question # 29

Refer to the exhibit. A network engineer is implementing multicast services on CPE-1 and CPE-2. CPE-1 must be configured as the preferred IGMP querier for the LAN segment. PIM-SM must be implemented on the LAN interfaces with an IGMP version that supports (*, G) joins only. Which configurations must the engineer implement on CPE-1 and CPE-2?

A.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

B.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255. 128

ip pim sparse-mode

ip igmp version 3

C.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

D.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

Full Access
Question # 30

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Full Access
Question # 31

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Full Access
Question # 32

Drag and drop the OSPF area types from the left onto the correct statements on the right

Full Access
Question # 33

Simulation1

Full Access
Question # 34

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Full Access
Question # 35

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Full Access
Question # 36

Simulation 5

Full Access
Question # 37

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Full Access
Question # 38

An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?

A.

Reset OSPF neighbor sessions to maintain state Information during router switchover

B.

Configure the device to repopulate state information using routing updates received from the BDR

C.

increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the switchover.

D.

Ensure that the dual RP has synchronized their state information before performing the switchover operation.

Full Access
Question # 39

Refer to the exhibit. The network engineer who manages ASN 65001 is troubleshooting suboptimal routing to the 198.18.15.0/24 prefix. According to the network requirements:

Routing to IP destinations in the 198.18.15.0/25 block must be preferred via the EDGE-1 PE.

Routing to IP destinations in the 198.18.15.128/25 block must be preferred via the EDGE-2 PE.

More specific prefixes of the 198.18.15.0/24 block must not be advertised beyond the boundaries of ASN 64611.

Routing to 198.18.15.0/24 must be redundant in case one of the uplinks on INT-R1 fails.

Which configuration must the network engineer implement on INT-R1 to correct the suboptimal routing and fix the issue?

A.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

B.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (internal, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

end

C.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-advertise, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OU

D.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT i

Full Access
Question # 40

Refer to the exhibit:

Which effect of this configuration is true?

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Full Access
Question # 41

Which statement describes the advantage of a Multi-Layer control plane?

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Full Access
Question # 42

Refer to the exhibit:

An engineer wants to authenticate the OSPF neighbor between PEA and PE-B using MD5.

Which command on PE-B successfully completes the configuration?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Full Access
Question # 44

Refer to the exhibits:

R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2 R1 message periodically Based on this output, which statement is true?

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

Full Access
Question # 45

Refer to the exhibit.

An engineer is configuring path selection on router R1 for two ASNs as shown. Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?

A.

Configure a low weigh! on the peer to ASN 4567.

B.

Configure a high weight on the peer to ASN 4567.

C.

Configure an AS path prepend on the peer to ASN 4567.

D.

Configure a high med on the peer to ASN 4567.

Full Access
Question # 46

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Full Access
Question # 47

Refer to the exhibit.

An engineer ran this show telemetry command to view subscription SUB11 on RouterX. The engineer then decided that RouterY should provide the same output lor sensor group SGroup13 as RouterX. The engineer cannot access RouterX to copy its configuration No access lists on the router block user access Which configuration must the engineer apply on RouterY to provide the same output from the show telemetry command?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

A customer site is being connected to a Frame Relay network via a T1 link. The customer has a contract for 512 kbps service with a Tc value of 125 ms. Under peak line conditions, customer traffic can reach four times the contracted speed. Which QoS configuration must the service provider implement to limit the customer to the contracted values?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 49

Which component is similar to an EVPN instance?

A.

MPLS label

B.

IGP router ID

C.

VRF

D.

router distinguisher

Full Access
Question # 50

How is RSVP used with MPLS traffic engineering tunnels?

A.

It assigns a tag to a packet as it travels through the tunnel.

B.

It removes and reassigns an MPLS label when the packet enters the tunnel.

C.

It reduces the CPU burden when a packet travels through the tunnel.

D.

It reserves bandwidth along the path of the tunnel.

Full Access
Question # 51

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

A.

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Full Access
Question # 52

Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1

Full Access
Question # 53

Drag and drop the methods of Cisco MPLS TE tunnel traffic assignment from the left onto their characteristics on the right.

Full Access
Question # 54

Refer to the exhibit.

An engineer is trying to implement BGP configuration on a router Which configuration error prevents the ASBR from establishing a BGP neighborship to a directly connected BGP speaker?

A.

The routing policy is absent for this Cisco IOS XR eBGP instance.

B.

The IPv4 address family configuration under neighbor configuration-mode must be removed.

C.

The VPNv4 address family interferes with the 8GP IPv4 address family negotiations.

D.

The TCP session parameters are not specified.

Full Access
Question # 55

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Full Access
Question # 57

Refer to Exhibit.

A network engineer is trying to retrieve SNMP MIBs with RESTCONF on the Cisco switch but fails. End-to-end routing is in place. Which configuration must the engineer implement on the switch to complete?

A.

netconf-yang cisco-ia snamp-community -string Public

B.

snmp-server community cisco RW

C.

snmp-server community public RO

D.

netconf-yang cisco-Ia snmp-community-string Private

Full Access
Question # 58

An engineer is trying to implement BGP in a multihomed architecture. What must the engineer configure to influence inbound path selection?

A.

A route map with WEIGHT attribute to control the inbound traffic.

B.

An offset list to set the metric for routes received from neighboring autonomous systems.

C.

An access list to identify traffic and enable it on both of the provider-facing interfaces.

D.

A route map with AS_PATH attribute to control the inbound traffic.

Full Access
Question # 59

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise then into OSPF area 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default router 0.0.0.0/0 is still missing. Which configuration must an engineer apply to resolve this problem?

  • uk.co.certification.simulator.questionpool.PList@1db5edb0

  • uk.co.certification.simulator.questionpool.PList@1db5edf0

  • uk.co.certification.simulator.questionpool.PList@1db5ee30

A.

Option D

Full Access
Question # 60

Which regular expression query modifier function indicates the start of a string?

A.

^

B.

[^]

C.

+

D.

$

Full Access
Question # 61

A network architect plans to implement MPLS OAM to provide additional troubleshooting functionality for the NOC team. After analyzing the configuration on the MPLS P/PE nodes, the architect decides to revise the CoPP policies. Which two actions ensure that the new solution is secure? (Choose two.)

A.

Allow port 3505 in the outbound direction only.

B.

Allow the ICMP protocol only.

C.

Allow the TCP and UDP protocols.

D.

Allow the UDP protocol only.

E.

Allow port 3503 in the inbound direction only.

Full Access
Question # 62

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 63

Refer to the exhibit. A network support engineer for ASN 65502 receives a technical support ticket from a customer in ASN 65503 who reports that an eBGP session is down. The engineer determines that the peering failed after a recent change to the device at 192.168.26.2. EDGE-GW-1 must establish an eBGP session with the peering router 192.168.26.2. Which configuration establishes this session?

A.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65503

address-family ipv4

neighbor 192.168.26.2 activate

end

B.

configure terminal

router bgp 65502

address-family ipv4

neighbor 192.168.26.2 activate

end

C.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

D.

configure terminal

router bgp 65502

no neighbor 192.168.26.2 remote-as 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

Full Access
Question # 64

Refer to the exhibit.

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

A.

Graphical user interface, text, application Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text, application, letter, email Description automatically generated

D.

Text, letter, email Description automatically generated

Full Access
Question # 65

An engineer a cisco MPLS tunnel to improve the streaming experience for the clients of a video -on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Full Access
Question # 67

Which is the benefit of implementing model-driven telemetry in a service provider environment?

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Full Access
Question # 68

Refer to the exhibit.

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Full Access
Question # 69

Simulation 3

Full Access
Question # 70

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

A.

Change the LDP password on R2 to Cisco.

B.

Configure mpls ldp router-id loopback0 on R1 and R2.

C.

Configure LDP session protection on R1.

D.

Change the discover hello hold time and interval to their default values.

Full Access
Question # 71

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

A.

When edge routers at different regional sites are connected over the global carrier backbone, MP-eBGP must run between the routers to exchange the customer VPNv4 routes

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Full Access
Question # 72

Refer to the exhibit.

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Full Access
Question # 73

Which three OSPF parameters must match before two devices can establish an OSPF adjacency? (Choose three.)

A.

IP address

B.

interface cost

C.

subnet mask

D.

process ID

E.

hello timer setting

F.

area number

Full Access
Question # 74

What is the function of Cisco NFV infrastructure platform?

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Full Access
Question # 75

What is the role of NFVI?

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Full Access
Question # 76

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Full Access
Question # 77

Which additional feature does MPLS DiffServ tunneling support?

A.

matching EXP and DSCP values

B.

interaction between MPLS and IGP

C.

using GRE tunnels to hide markings

D.

PHB layer management

Full Access
Question # 78

Drag and drop the LDP features from the left onto their usages on the right.

Full Access
Question # 79

Drag and drop the functionalities from the left onto the target fields on the right.

Full Access
Question # 80

Refer to the exhibit. Routers P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering. P4 is the primary Internet gateway router, and P5 is its backup. P5 is already advertising a default route into the OSPF domain. Which configuration must be applied to P4 so that it advertises a default route into OSPF and becomes the primary Internet gateway for the network?

A.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 2

end

B.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 1

end

C.

configure terminal

router ospfv3 100

address-family ipv4 unicast

redistribute bgp 65500 metric 40 metric-type 1

end

D.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate always metric 40 metric-type 1

end

Full Access
Question # 81

Refer to the exhibit.

AN engineer is configuring segment routing on an ISP to simplify traffic engineering and management across network domains. What should the engineer do to complete the implementation of segment routing?

A.

OSPF must be configured with wide area metrics to support routing.

B.

The segment will run without any further configuration.

C.

Area authentication must be enable before segment routing will run.

D.

Area Authentication must be enable before segment routing will run.

Full Access
Question # 82

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Full Access
Question # 83

FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?

A.

LSP attempts fast switching on the backup path until the primary path returns to the active state.

B.

The headend router uses a presignaled LSP to bypass the failure point.

C.

A new backup tunnel is established past the PLR to pass through the protected nodes

D.

Backup tunnel is established and intersects with the primary tunnel at the headend.

Full Access
Question # 84

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Full Access
Question # 85

Which OS uses a distributed subsystem architecture?

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Full Access
Question # 86

What is a feature of mVPN?

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Full Access
Question # 87

Drag and drop the functions from the path computation element protocol roles on the right.

Full Access
Question # 88

Drag and drop the LDP features from the left onto the correct usages on the right.

Full Access
Question # 89

The service provider is serving hosts with two different multicast streams from source X and source Y. Source X is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should send its stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?

A.

Enable ip pim ssm default on RA and RB.

B.

Add ip pim bidir-enable in global mode on RB.

C.

Permit the source X and source Y IP addresses in the access list on RB.

D.

Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.

Full Access
Question # 90

Which Cisco software OS uses monolithic architecture?

A.

NX-OS

B.

IOS XE

C.

IOS XR

D.

IOS

Full Access
Question # 91

Which two tasks must an engineer perform when implementing LDP NSF on the network? (Choose two.)

A.

Disable Cisco Express Forwarding.

B.

Enable NSF for EIGRP.

C.

Enable NSF for the link-state routing protocol that is in use on the network.

D.

Implement direct connections for LDP peers.

E.

Enable NSF for BGP.

Full Access
Question # 92

Which two tasks must you perform when you implement LDP NSF on your network? (Choose two.)

A.

Enable NSF for EIGRP

B.

Enable NSF for the link-state routing protocol that is in use on the network.

C.

Disable Cisco Express Forwarding

D.

Implement direct connections for LDP peers

E.

Enable NSF for BGP

Full Access
Question # 93

Refer to the exhibit:

Which statement about this configuration is true"?

A.

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Full Access
Question # 94

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Full Access
Question # 95

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 96

Refer to the exhibit.

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 97

Refer to the exhibit:

In which way does router R1 operate differently than router R2?

A.

R1 sends LSA type 2 only, while R2 sends type 1 and type 7 LSAs

B.

R1 sends LSA types 1 and 2, while R2 sends type 1. 2. and 7 LSAs

C.

R1 sends LSA type 2 only and R2 sends LSA type 1 only

D.

R1 sends LSA types 5 and 7, while R2 sends type 1, 2, and 7 LSAs

Full Access
Question # 98

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Full Access
Question # 99

Refer to the exhibit.

Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Refer to the exhibit. An engineer must Implement a traceroute operation to verity the R1 point-to-multipoint LSP connections. The traceroute operation must return all labels and hop-by-hop IP addresses for destinations 10.20.0.1. 10.30.0.1, and 10.40.0.1. and the maximum number of hops is 4. Which command must be executed to meet the requirements?

A.

traceroute mpls traffic-eng tunnel-mte 10 ttl 4

B.

traceroute mpls traffic-eng tunnel-mte 10 responder-id 10.40.0.1

C.

traceroute mpls ipv4 10.30.0.1/32 fee-type generic

D.

traceroute mpls ipv4 10.20.0.1/32 ttl 4

Full Access
Question # 101

Refer to the exhibit:

Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?

A.

The interface on the OSPF peer must use the same key ID and key value as the configured interface

B.

The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface

C.

The OSPF peer must be configured as an OSPF stub router

D.

The OSPF peer must use clear-text authentication

Full Access
Question # 102

Refer to me exhibit.

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Full Access
Question # 103

Refer to the exhibit an engineer working for a private telecommunication company with an employee Id: 4065:96:080 upgrades the WAN link between routers ASBR-101 and ASBR-201 to 1Gb by Installing a new physical connection between the Gi3 Interfaces. Which BGP attribute must the engineer configure on ASBR-201 so that the existing WAN link on Gi2 Is maintained as a backup?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Full Access
Question # 105

Refer to the exhibit.

An engineer applied a gRPC dial-in configuration on customer's router to provide connection multiplexing and two-way streaming. What does this configuration accomplish in a gRPC?

A.

It is the encoding requested by the gRPC server.

B.

IT is the encoding that is used for dial-in and dial-out.

C.

It is used for encoding with the default protocol buffers

D.

It is the encoding requested by the gRPC client.

Full Access
Question # 106

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Full Access
Question # 107

Refer to the exhibit. Tier 2 ISP A on AS 653 is connected to two Tier 1 ISPs on AS 321 and AS 51 respectively. The network architect at ISP A is planning traffic flow inside the network to provide predictable network services. Cisco Express Forwarding is disabled on the edge router. How should the architect implement BGP to direct all traffic via the Tier 1 ISP with next-hop 7.4.5.2?

A.

Implement the BGP routing protocol and run the bgp deterministic-med command.

B.

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid command.

C.

Implement the BGP routing protocol and the maximum-paths 2 configuration.

D.

Implement BGP route-reflector functionality with the bgp always-compare-med configuration.

Full Access
Question # 108

What are two features of 6RD IPv6 transition mechanism? (Choose two.)

A.

It inserts IPv4 bits into an IPv6 delegated prefix.

B.

It uses a native IPv6-routed network between CE routers and the BR router.

C.

It allows dynamic 1:N translation of IPv6 address.

D.

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

E.

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.

Full Access
Question # 109

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

A.

The R6 backup tunnel path R6-R1-R4-R5.

B.

The R2 backup tunnel path R2-R5 across the alternate link.

C.

The R2 backup tunnel path R2-R1-R4-XR1-XR2.

D.

The R6 backup tunnel path R6-R2-R5

E.

The R6 backup tunnel path R6-R1-R2.

Full Access
Question # 110

Refer to the exhibit.

What is the result of this configuration?

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

Full Access
Question # 111

Refer to the exhibit:

Assume all other configurations are correct and the network is otherwise operating normally. Which conclusion can you draw about the neighbor relationship between routers R1 and R2?

A.

The neighbor relationship will be up only if the two devices have activated the correct neighbor relationships under the IPv4 address family

B.

The neighbor relationship is down because R1 believes R2 is in AS 65012.

C.

The neighbor relationship is up

D.

The neighbor relationship is down because the loco I-as value for R2 is missing in the R1 neighbor statement

Full Access
Question # 112

Refer to the exhibit:

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Full Access
Question # 113

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Full Access
Question # 114

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Full Access
Question # 115

Refer to the exhibit.

An engineer is reviewing the BGP configuration. Which routes must be advertised to 10.10.10.1

A.

Local routes are permitted, and routes from other ASNs are denied.

B.

All routes whether local or from other ASNs are denied.

C.

Local routes are denied, and routes from other ASNs are permitted.

D.

All routes whether local or from other ASNs are permitted.

Full Access
Question # 116

Refer to the exhibit Routers R1 and R2 are connected via a señal link and use the IS-IS routing protocol for route exchange After a configuration change on R2. IS-IS connectivity is interrupted A network engineer confirmed that the interfaces are in the UP state and connectivity exists between the two routers. Which two actions must the engineer perform to resolve the problem? (Choose two.)

A.

Disable padding for hello packets under the serial interface on R2 DUMPS

B.

Change the hello interface timer to 10 seconds on R1.

C.

Change the MTU to 1500 bytes on R2.

D.

Enable hello packet padding globally on R1.

E.

Change R2 to an IS-IS Level 1 router.

Full Access
Question # 117

An engineer must implement QoS to prioritize traffic that requires better service throughout the network. The engineer started by configuring a class map to identify the high-priority traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

A.

Attach the class map to a policy map that sets the minimum bandwidth allocated to the classified traffic and designates the action to be taken on the traffic.

B.

Attach the class map to a policy map that designates the action to be taken on the classified traffic and then attach the policy map to an interface using a service policy.

C.

Attach the class map to a policy map within a VRF to segregate the high-priority traffic and then attach the policy map to an interface in another VRF.

D.

Create a route map to manipulate the routes that are entered into the routing table and then attach the route map to an interface using a service policy.

Full Access
Question # 118

What causes multicast traffic to permanently stay on the shared tree and not switch to the source tree?

A.

The SPT threshold is set to infinity.

B.

The RP IP address is configured incorrectly.

C.

The RP announcements are being filtered.

D.

SSM range is being used.

Full Access
Question # 119

Refer to the exhibit.

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 120

Refer to the exhibit.

To protect in-band management access to CPE-R7, an engineer wants to allow only SSH management and provisioning traffic from management network 192.168.0.0/16. Which infrastructure ACL change must be applied to router PE-R9 to complete this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 121

Refer to the exhibit.

The CE router is peering with both PE routers and advertising a public prefix to the internet. Routing to and from this prefix will be asymmetric under certain network conditions, but packets must not be discarded. Which configuration must an engineer apply to the two PE routers so that they validate reverse packet forwarding for packets entering their Gi2 interfaces and drop traffic from the RFC1918 space?

A.

ip verify unicast source reachable-via rx allow-default

B.

interface GigabitEthernet 2

ip verify unicast source reachable-via rx

C.

ip verify unicast source reachable-via any allow-default

interface GigabitEthernet 2

D.

ip verify unicast source reachable-via any

Full Access
Question # 122

Which characteristic describes prefix segment identifier?

A.

It contains the interface address of the device per each link.

B.

It Is globally unique.

C.

It is locally unique.

D.

It contains a router to a neighbor.

Full Access
Question # 123

Refer to the exhibit.

CE1 and CE2 require connectivity to the internet through the ISP connected to PE3 What should an engineer configure to complete this task?

A.

PE2 must be configured to serve as a route reflector for PE3 routes learned from the internet. PE2 then shares the routes with CE1 and CE2.

B.

CE1 and CE2 must be configured with a route distinguisher in the PE1 VRF that dynamically imports the route from the internet.

C.

CE1 and CE2 must be configured to use a static default route with a next-hop of PE3 to reach internet routes.

D.

PE1 must be configured with an import route target in the CE1 VRF that matches the export route target for the internet VRF on PE3.

Full Access
Question # 124

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Full Access
Question # 125

What do Chef and Puppet have in common?

A.

use Ruby

B.

use a master server

C.

require modules to be created from scratch

D.

manage agents referred to as minions

Full Access
Question # 126

A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?

A.

Configure a different route distinguisher for each prefix.

B.

Define the site of origin on each interface.

C.

Define VRFs on each device to separate the traffic.

D.

Enable bidirectional forwarding detection on each device.

Full Access
Question # 127

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Full Access
Question # 128

Refer to the exhibit. Four midsize service providers provide access to different customers that use Layer 3 VPN services to enable communication across geographic regions. The service providers are connected as shown in the exhibit, and the PEs have established eBGP relationships. PE4 has an IBGP relationship with PE5. The routes that PE4 learns from PE5 must reach the other PE routers, but they are absent from the routing tables on the other PES. Which action should the engineers take to correct the problem?

A.

Configure a peering between all five Pes.

B.

Disable BGP synchronization on PE4.

C.

Enable BOP IPv4 unicast on PE4 and PE5

D.

Advertise the route targets for PE5 to the other PEs

Full Access
Question # 129

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Full Access
Question # 130

Refer to the exhibit. An engineer is configuring IS-IS on ISP network. Which IS-IS configuration must an engineer implement on router AGG1 so that it establishes connectivity to router AGG6 via the BB3 core router?

A.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-2

B.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-2

C.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-1

D.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-1

Full Access
Question # 131

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Full Access
Question # 132

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Full Access
Question # 133

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Full Access
Question # 134

Refer to the exhibit:

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

A.

It shows the hostname of the device as rpc-reply

B.

It shows that the running configuration is blank

C.

It shows NETCONF uses remote procedure calls.

D.

It shows that the full configuration is being modeled by VANG

Full Access
Question # 135

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access